Abstract—We consider the problem of how to provide an execution environment where the application’s secrets are safe even in the presence of malicious system software layers. We propose Iso-X — a flexible, fine-grained hardware-supported framework that provides isolation for security-critical pieces of an application such that they can execute securely even in the presence of untrusted system software. Isolation in Iso-X is achieved by creating and dynamically managing compartments to host critical fragments of code and associated data. Iso-X provides fine-grained isolation at the memory-page level, flexible allocation of memory, and a low-complexity, hardware-only trusted computing base. Iso-X requires minimal additional hardware, a small ...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
© 2004-2012 IEEE. Due to the requirements of the Internet-of-Things, modern embedded systems have be...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
We consider the problem of how to provide an execution environment where the application's secrets a...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
The size and complexity of modern applications are the underlying causes of numerous security vulner...
Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable i...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Many embedded systems have relatively strong security requirements because they handle confidential ...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Hardware support for isolated execution (such as Intel SGX) enables development of applications that...
Application size and complexity are the underlying cause of numerous security vulnerabilities in cod...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
Heterogeneous CPU-FPGA systems have been shown to achieve significant performance gains in domain-sp...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
© 2004-2012 IEEE. Due to the requirements of the Internet-of-Things, modern embedded systems have be...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
We consider the problem of how to provide an execution environment where the application's secrets a...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
The size and complexity of modern applications are the underlying causes of numerous security vulner...
Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable i...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Many embedded systems have relatively strong security requirements because they handle confidential ...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Hardware support for isolated execution (such as Intel SGX) enables development of applications that...
Application size and complexity are the underlying cause of numerous security vulnerabilities in cod...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
Heterogeneous CPU-FPGA systems have been shown to achieve significant performance gains in domain-sp...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
© 2004-2012 IEEE. Due to the requirements of the Internet-of-Things, modern embedded systems have be...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...